You are on page 1of 6

Dashboard / My courses / BL-IT-6310-LEC-1933T / Prelim Exam / PEXAM Network Security

Started on Sunday, 16 February 2020, 1:19 PM


State Finished
Completed on Sunday, 16 February 2020, 1:39 PM
Time taken 20 mins 4 secs
Grade 25.00 out of 30.00 (83%)

Question 1 It was the first generation security standard for wireless network. 
Correct

Mark 1.00 out of Select one:


1.00
a. WEP 

b. ASC

c. WRT

d. AST 

Your answer is correct.

Question 2
If there's one common theme among security experts, it's that relying on one single line of defense is dangerous,
Correct
because any single defensive tool can be defeated by a determined adversary. 
Mark 2.00 out of
2.00

Answer: defense in depth strategy 

Question 3 This is a way of protecting a computer from intrusion through the ports. 
Correct

Mark 2.00 out of


2.00 Answer: firewall 

Question 4 It helps keep data and equipment safe by giving only the appropriate people access. 
Incorrect

Mark 0.00 out of


2.00 Answer: computer and network security 

Question 5
 A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure
Correct
network, creating a secure, encrypted "tunnel" across the open internet.
Mark 2.00 out of
2.00

Answer: VPN 
Question 6 These are the events or attacks that remove, corrupt, deny access to, allow access to, or steal information. 
Correct

Mark 1.00 out of Select one:


1.00
a. external security attacks 

b. data security attacks  

c. code security attacks 

d. internal security attacks 

Your answer is correct.

Question 7 Software designed to detect, disable, and remove viruses, worms, and Trojans. 
Correct

Mark 1.00 out of Select one:


1.00
a. antivirus  

b. virus 

c. worm 

d. antidote 

Your answer is correct.

Question 8 This is an improved version of WEP. 


Correct

Mark 1.00 out of Select one:


1.00
a. VLC

b. GIP 

c. GPS

d. WPA  

Your answer is correct.

Question 9 It is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA. 
Correct

Mark 1.00 out of Select one:


1.00
a. LEAP 

b. EXE

c. RMG

d. RAM

Your answer is correct.


Question 10 One example is when an employee intends to cause damage. 
Correct

Mark 1.00 out of Select one:


1.00
a. malicious threats  

b. secure threats 

c. open threats 

Your answer is correct.

Question 11 It is a self-replicating program that is harmful to networks. 


Correct

Mark 2.00 out of


2.00 Answer: worm 

Question 12 It uses code to access operating systems and software. 


Correct

Mark 1.00 out of Select one:


1.00
a. close attacks 

b. malicious attacks 

c. open attacks 

d. structured attacks 

Your answer is correct.

Question 13 It helps prevent attackers from monitoring or recording traffic between resources and computers. 
Correct

Mark 1.00 out of Select one:


1.00
a. open encryption 

b. data encryption  

c. security code

d. data saving mode 

Your answer is correct.

Question 14 This refers to the events or attacks that steal, damage, or destroy equipment. 
Correct

Mark 1.00 out of Select one:


1.00
a. external security threats 

b. internal security threats 

c. physical security threats  

d. social security threats 

Your answer is correct.


Question 15 This is a networking infrastructure company.
Correct

Mark 1.00 out of Select one:


1.00
a. JavaScript

b. CISCO 

c. Network Apps

Your answer is correct.

Question 16 It uses available resources, such as passwords or scripts. 


Incorrect

Mark 0.00 out of Select one:


1.00
a. open attacks  

b. common attacks 

c. structured attacks 

d. unstructured attacks 

Your answer is incorrect.

Question 17
 Human beings are inevitably the weakest security link. You need to implement technologies and processes to
Correct
ensure that staffers don't deliberately or inadvertently send sensitive data outside the network.
Mark 1.00 out of
1.00

Select one:
a. E-mail Security 

b. Data Loss Prevention 

c. Firewall

Your answer is correct.

Question 18 This is data being transported on a network. 


Correct

Mark 1.00 out of Select one:


1.00
a. traffic 

b. worm 

c. virus 

d. antidote 

Your answer is correct.


Question 19 This is when the user damages data or equipment unintentionally. 
Correct

Mark 1.00 out of Select one:


1.00
a. accidental threats  

b. internal threats

c. leading threats 

d. external threats 

Your answer is correct.

Question 20 It disguises as useful software. 


Correct

Mark 1.00 out of Select one:


1.00
a. trojan horse  

b. .jpl

c. sad mcface 

d. .exe

Your answer is correct.

Question 21 If the network isn't a line or a point: it's a _____________.


Incorrect

Mark 0.00 out of Select one:


1.00
a. server down 

b. protected  

c. territory 

Your answer is incorrect.

Question 22 It could be exploited because of an encryption key that was vulnerable to decoding. 
Correct

Mark 1.00 out of Select one:


1.00
a. WEP 64  

b. WEP 65 

c. WSP 90

d. WSP 75

Your answer is correct.


Question 23 These are created with malicious intent and sent by attackers. 
Correct

Mark 1.00 out of Select one:


1.00
a. saving mode

b. antidote 

c. virus 

d. worm 

Your answer is correct.

Question 24 A security layer used in mobile devices that employ the Wireless Applications Protocol (WAP). 
Correct

Mark 1.00 out of Select one:


1.00
a. WWW

b. WSAW

c. Wi-Fi 

d. WTLS 

Your answer is correct.

Question 25 This is an enhanced encryption protocol combining a 104-bit key and a 24-bit initializing vector. 
Incorrect

Mark 0.00 out of Select one:


1.00
a. WEP 130 

b. WSP 128 

c. WSP 130

d. WEP 128 

Your answer is incorrect.

◄ PQ2 Network Security Jump to... MQ1 ►

You might also like